Type: Keyphrase
Name: Malware
First reported 11 hours ago - Updated 44 mins ago - 5 reports

Home Depot may be the latest data breach victim

, 3:29 PMBy Thad Rueter Senior EditorThe Top 500 retail chain says it is investigating ‘unusual activity.’The Home Depot Inc., No. 16 in the Internet Retailer Top 500 Guide , today said it was investigating whether criminals stole consumer and payment ... [Published - 44 mins ago]
First reported 10 hours ago - Updated 5 hours ago - 3 reports

Hackers are using Google's antivirus tool to test their attacks

Google's VirusTotal[1] site can be very handy if you're worried about malware; upload a file and dozens of antivirus tools will check to see if it's malicious. However, it's now clear that this site can hinder as much as it helps. Security research Brandon ... [Published DailyMe.Com - 5 hours ago]
First reported 12 hours ago - Updated 7 hours ago - 2 reports

Don't be stupid - How to keep your naked photos out of hackers' hands

Cybercriminals are experts at duping people into downloading malicious software that can give them access to your personal information and passwords. But there are commonsense steps you can take to avoid getting hacked: • Avoid bad links: Check where ... [Published DailyMe.Com - 7 hours ago]
First reported 12 hours ago - Updated 9 hours ago - 3 reports

Hackers using drive by malware that leaves no files on a system

A relatively new form of malware has surfaced that, unlike most malware, leaves no files on the victims computer. The Angler exploit kit—a Web-based attack tool—injects malicious code directly into other processes.Fileless malware threats are not new, ... [Published - 9 hours ago]
First reported 12 hours ago - Updated 12 hours ago - 3 reports

Goodwill® Provides Update On Data Security Issue

The malware attack affected the third-party vendor's systems intermittently between February 10, 2013, and August 14, 2014. Some stores experienced shorter periods of impact. A list of the Goodwill members' store locations that used the affected vendor ... [Published Indianapolis Business Journal - 12 hours ago]
Entities: Security, Malware, Attack
First reported Sep 02 2014 - Updated 13 hours ago - 3 reports

Whopping 160,000 new malware samples detected every day in Q2

15 million new malware samples were generated during the quarter. ... [Published Computer Business Review - 13 hours ago]
Entities: Malware
First reported 17 hours ago - Updated 15 hours ago - 5 reports

Threat Outbreak Alert RuleID11345: Email Messages Distributing Malicious Software on September 2, 2014

Entities: Malware, Threat
First reported 18 hours ago - Updated 17 hours ago - 2 reports

How to Mitigate Merchant Malware Threat

The explosion in POS malware attacks against U.S. merchants highlights the need for retailers to take bolder security steps. Troy Leach of the PCI Council and Karl Sigler of Trustwave outline key steps. ... [Published - 17 hours ago]
Entities: Malware, Threat, Karl Sigler
First reported Sep 01 2014 - Updated 19 hours ago - 6 reports

India Ranks Fourth Among Most Malware-Affected Nations: F-Secure

NEW DELHI: Growing popularity of smartphones and rising data usage in India is also making the country a favourite among cybercriminals, who are increasingly attacking mobile phones using malware.India, the world's fastest growing handset market, is the ... [Published Silicon India - 19 hours ago]
First reported 22 hours ago - Updated 21 hours ago - 2 reports

Mac Antivirus Test Reveals Winners, Losers

Test results from independent labs around the world are invaluable in helping identify the best antivirus products. The vast majority of these tests focus on Windows/PC malware, though tests of Android protection are becoming more common. We hardly ever ... [Published PC Magazine - 21 hours ago]
First reported Sep 01 2014 - Updated 22 hours ago - 4 reports

India Ranks Fourth In Mobile Malware Threats Globally

With over 900 million mobile phones, India ranked the fourth-most mobile malware infected country in the world in the first half of the year, according to a new report. The F-Secure Labs’ Threat Report H1 2014 suggested that tier-II cities are becoming ... [Published CXOtoday - 22 hours ago]
First reported Sep 01 2014 - Updated Sep 02 2014 - 3 reports

Password guessing malware blamed for nude celeb photo leak

September 1, 2014 | Posted by Dan RaywoodMalware which uses brute force tactics to try and gain access to user accounts has been blamed for the leaking of nude celebrity photos.According to The Next Web , intimate photos of actresses and singers were ... [Published IT Security Guru - Sep 01 2014]
Entities: Celebrity, Malware, iCloud


"Technology is good, but I think, in general, there is an overreliance by the consumer on technology. You have to be vigilant," Richter said. "It's like having airbags and anti-lock brakes in your car. You still have to drive the car carefully." protect education resources against threats entering the network via Google's Chromebook and cloud-based mobile devices," continued Martini. "This exposes schools to malware and infections entering the network, and worse, it compromises students' personal data. With this tool, students can continue to benefit from mobile technologies in the classroom."
...volume of them creates the perfect environment for malicious activity," said Tim van der Horst, senior threat researcher for Blue Coat Systems. "The rapid building up and tearing down of new and unknown sites destabilizes many existing security controls. Understanding what these sites are and how they are used is a key to building a better security posture."
"Again, we are very sorry this happened and we thank you for your continued support in helping Goodwill meet its mission of helping people with barriers to employment achieve economic independence for themselves and their families."

More Content

All (14297) | News (7039) | Reports (3) | Blogs (7226) | Audio/Video (1) | Fact Sheets (4) | Press Releases (19)
sort by: Date | Relevance
RVAsec - Brian Baskin - Introducing Intelligenc... [Published SecurityTube.Net - 20 mins ago]
Home Depot may be the latest data breach victim [Published - 44 mins ago]
How to keep your digital private life private —... [Published Burlington Record - 1 hour ago]
Perth engineering firm pays out $65k for Autode... [Published Computerworld Australia - 1 hour ago]
Security breach had no impact on local Goodwill... [Published KHQ Right Now - 1 hour ago]
iboss Highlights Security Risks Associated with... [Published - 1 hour ago]
5 Reasons Not to Search for Those Nude Celebrit... [Published - 2 hours ago]
7 Scams That Just Won’t Die [Published - 2 hours ago]
USB firmware: An upcoming threat for home and e... [Published Microsoft Malware Protection Center - 3 hours ago]
Mobile threat no passing fad [Published - 4 hours ago]
The new face of cybercrime [Published Business Spectator - 4 hours ago]
Blue Coat warns of One Day Wonders [Published - 4 hours ago]
Goodwill stores in Pikes Peak region impacted b... [Published Colorado Springs Gazette - 4 hours ago]
Car makers, space craft manufacturers infected ... [Published The Register - 4 hours ago]
Trusted insider a security threat, warns Brandis [Published Computerworld Australia - 5 hours ago]
Nude celebrity photos linked to 'very targeted ... [Published CSO Magazine - 5 hours ago]
Hackers are using Google's antivirus tool to te... [Published DailyMe.Com - 5 hours ago]
11 Goodwill stores in Colorado impacted by data... [Published - 6 hours ago]
Other Shoe Drops in CyberVor Hack Attack [Published E-Commerce Times - 6 hours ago]
Daily Tech Briefing: Sept. 2, 2014 [Published eWeek - 6 hours ago]
Weekly phishing attacks rampant: HP study [Published Connections Plus - 6 hours ago]
System-on-chip malicious code detection apparat... [Published Free Patents Online - 6 hours ago]
Run-time additive disinfection of malware funct... [Published Free Patents Online - 6 hours ago]
Using telemetry to reduce malware definition pa... [Published Free Patents Online - 6 hours ago]
Apparatus and methods for protecting removable ... [Published Free Patents Online - 6 hours ago]
Brandis warns against future Snowdens and Mannings [Published ZDNet - 6 hours ago]
Apple’s Two Factor Authentication Doesn’t Prote... [Published TechCrunch - 6 hours ago]
Daily Ruleset Update Summary 09/02/2014 [Published Emerging Threats - 6 hours ago]
The Scan: Are You Security Savvy on #Social? [Published McAfee Blogs - 6 hours ago]
Massive Home Depot cyber breach happened months... [Published DailyMe.Com - 6 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
Content Volume
Document Volume


sort by: Date | Relevance
RVAsec - Brian Baskin - Introducing Intelligenc... [Published SecurityTube.Net - 20 mins ago]
Malware analysis is the current en vogue topic for computer security companies and careers. However, many are still approaching malware the same way their forefathers did a decade ago. Malware analysis without intelligence leads to slower responses, duplication ...
USB firmware: An upcoming threat for home and e... [Published Microsoft Malware Protection Center - 3 hours ago]
Every year, thousands of hackers and security researchers from around the world descend on Las Vegas to attend the annual Black Hat security conference. The conference boasts top notch security presentations from industry leaders – often centered on ...
Daily Ruleset Update Summary 09/02/2014 [Published Emerging Threats - 6 hours ago]
[***] Summary: [***] 4 new Open signatures, 16 new Pro (4+12). FlashPack, OneLouder, Various Android, Sality.AM. Thanks: @EKWatcher [+++] Added rules: [+++] Open: 2019100 – ET CURRENT_EVENTS FlashPack EK Redirect Sept 01 2014 (current_events.rules) ...
The Scan: Are You Security Savvy on #Social? [Published McAfee Blogs - 6 hours ago]
Hey guys! I’m Bradi, and this is The Scan. Scan, this is everybody. #safeneversleeps Do you share too much on social media? If so, there’s more at stake than just annoying your friends – it could cost you money. Depending on what you post, potential ...
Google Bans App From Play Store B... [Published Techdirt - 8 hours ago]
Having had our own run ins with Google's opaque (and often hypocritical) decision-making process at times, it's not surprising (though unfortunate) to hear of yet another case. The folks over at have been working on tools to give people ...
1 2 3 4 5 6 7 8 9 10 ...


sort by: Date | Relevance
TECH PM - Videogame Console Sales Remain Strong [Published Wall Street Journal Tech News Briefing - May 16 2014]

Press Releases

sort by: Date | Relevance
The UPS Store, Inc. Notifies Customers Of Poten... [Published GlobeNewswire: Acquisitions News - Aug 20 2014]
MRG Effitas Awards Wontok SafeCentral New Real ... [Published GlobeNewswire: Acquisitions News - Jul 21 2014]
Hexis Cyber Solutions and Infosecurity Magazine... [Published GlobeNewswire: Acquisitions News - Jul 15 2014]
PeerNova Announces Investment by Cyber-Security... [Published GlobeNewswire: Acquisitions News - Jul 08 2014]
Speech: Karen Bradley Speech on UK Cyber Security [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
1 2 3 4
Contact Us

Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.